{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T01:24:45.300","vulnerabilities":[{"cve":{"id":"CVE-2024-1473","sourceIdentifier":"security@wordfence.com","published":"2024-03-20T07:15:10.133","lastModified":"2026-04-08T18:20:39.923","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Coming Soon & Maintenance Mode by Colorlib plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.99 via the REST API. This makes it possible for unauthenticated attackers to obtain post and page contents via REST API thus bypassing maintenance mode protection provided by the plugin."},{"lang":"es","value":"El complemento Coming Soon &amp; Maintenance Mode de Colorlib para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 1.0.99 incluida a través de la API REST. Esto permite que atacantes no autenticados obtengan el contenido de las publicaciones y páginas a través de la API REST, eludiendo así la protección del modo de mantenimiento que ofrece el complemento."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:colorlib:coming_soon_\\&_maintenance_mode:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.0.99","matchCriteriaId":"C44A079E-1149-4385-AE7F-F24691DA3FD8"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/changeset/3058925/colorlib-coming-soon-maintenance/trunk/colorlib-coming-soon-and-maintenance-mode.php","source":"security@wordfence.com"},{"url":"https://wordpress.org/plugins/colorlib-coming-soon-maintenance/","source":"security@wordfence.com","tags":["Product"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/48dc10a9-7bb9-401f-befd-1bf620858825?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://wordpress.org/plugins/colorlib-coming-soon-maintenance/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/48dc10a9-7bb9-401f-befd-1bf620858825?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}